The feedbacks reduce observer state after each run to a single `is_interesting`-value. If a testcase is interesting, it may be added to a Corpus.
Don't most of these projects have a requirements.txt? That would be my first thought when trying to find deps. Getting the size of a package is above my head.
I've been using RiMusic
This might be dumb, but what if you used parsec on the other machine?
Nicole endgame
Both wallets don't have any transactions so it doesn't seem like anything. I kind of want to do more investigation into whoever runs nicole honestly.
Nicole endgame
BTC:
1H5qsQHFgQbLGgk1qDMTBiVFaxBdSZVFTy
LTC:
LY3UnBfq2VgmTF3AkLU862fNij7UBnm7kZ
Nicole endgame
Could you drop the BTC address? I wanna look at the transactions.
What's kiwi farms? I'm not really in the loop on this issue.
*Patrick's
If you're worried, download it into a file first and read it.
This is hard to say without knowing the use of the scripts. If it's something to be used as normal CLI tools, probably some place that's in the user's path. If it's something else, I would just have it download to the current working directory so that the user has the choice on where to put it.
I wonder if a user agent spoofer would get around that?
The rusty wrench approach
egg🐦irl
It's also a post in a trans community, so it probably speaks to a lot of people's experiences. I didn't feel like it's rude, especially after thinking about it recontextualized from a political context. Like, what if someone made a meme about seeing leftist memes but they were really a "conservative" and that was posted in a leftist circle. It might just be me, but it doesn't seem rude either way because that would speak to me as someone in a circle like that.
From my understanding, i2p is an anonymity focused way to access the Internet. It cant access normal websites, but it can access I2P websites. The main difference between i2p and tor routing is that i2p uses what's called "garlic routing" and tor uses "onion routing". Without getting into specifics, unlike Tor, on i2p in order to join the network you also have to let other people's traffic go through your computer. This is called being a relay. I2p initially started as a way to obfuscate your IP address to access IRC channels, but has been expanded to be its own dark web.
i2pd is just the program that would allow you to connect to the i2p network. Usually when a program has the letter d at the end, it's what's called a daemon, which is just a program that sits in the background waiting for you to ask it to handle something. In this case i2pd is waiting to handle your i2p traffic.
I think I actually learned the word عبادة from transliteration now that you mention it. Thanks for pointing that out!
It's funny you say this because it was around the time I became self aware that I started to doubt religion.
I'm curious about your point of view bc ur comment sounds like you don't believe in religion but your username sounds like something religious(I'm not a native Arabic speaker). It roughly translates to "witness of worship", right?

What makes Waterfox different?
The first time I've heard about this browser was here on Lemmy maybe 20 minutes ago. A quick look at their webpage says that they use gecko as their web engine, but doesn't specify it bring a fork of Firefox.
To put this in context, most gecko based browsers I've heard about recently have also been Firefox forks. Is Waterfox a Firefox fork? And what does Waterfox do differently that should make people consider it more than Librewolf or another Firefox fork?
It really depends on tone and how long the interaction would last. I'd consider saying that rude most of the time as the person making small talk is just doing something nice.
I'm not exactly sure how to respond to that.
I didn't even think about how context dependent C++ is until you mentioned that. That's a really good point
I have games installed but I mostly just write programs for fun now. I usually don't get a ton of time to play games, plus they haven't been as fun as they used to be as a kid.

How would you recommend rate limiting your own program?
I've been coming back to the same project a few times. It's essentially just a program that interacts with an API. Only problem is whenever I get back to it, I realize how annoying it is to debug through all the "too many requests" responses I get back from the API because it has a max of 200 requests per second.
On solution would be to filter out those responses but that just feels like the wrong move, so I'm guessing the better solution would be to put some sort of rate limiter on my program. My two questions are: does that seem like a good solution and if it is, do I embed the rate limiter in my program, i.e. using the ratelimit crate or would a better solution be to run my program in a container and connect it to a reverse proxy(I think) container and control rate limiting from there?

Do you know how to use Feedbacks in LibAFL?
I've been trying to learn the fuzzing library LibAFL for a while now, but I never seem to be able to fully grasp the essential parts. I've read tutorials, followed along tutorials, read the whole LibAFL book (that's still under construction), and have read a few of the examples in the repo. You could say I'm still in tutorial hell, honestly.
I'm trying to write a simple fuzzer for a malware code sample (MooBot) and I've been trying to figure out two things: how to find the input that has the maximum run time for a function, and how to not run malware directly on my computer. One of them should be more important than the other, but given my lack of expertise in LibAFL right now, I'm focused on the former. For my example, I noticed that there's a custom trim function in MooBot that helps sanitize input:
c
void trim(char *str) { int i, begin = 0, end = strlen(str) - 1; while (isspa

Making malware
This is going to sound fishy.
Recently getting into cybersecurity things and have been pretty interested in looking at malware and maybe making some myself to get the hang of it. Do you guys know any good repositories with malware to learn from? For example, if I wanted to make a credential stealing program, there's a lot of different programs that may have credentials that are valuable. Or, maybe writing a keylogger? I took a look at a rust crate that can record keystrokes but has kind of a weird (or at least not as easy) type system because of different OS implementations, but how do different types of malware consolidate those differences?
I guess the broader question I'm getting at specifically is looking at how already made programs get around different technical obstacles like detailed above.
Thanks

Good Computer Handbooks
I went to my local library today and noticed there's a lot of networking, cybersecurity, tcp/ip books from the early 2000s. Now, I want more modern versions of these types of handbooks. Does anyone know any good modern handbooks that deal with networking or network security standards?
Thanks :)

Car Privacy is Shit
I wanted to get others' takes but it seems like the only real way to get a non-spying car is to get an older car without any sort of telemetrics. I saw a video about different car companies' security policies, well specifically the new Mental Outlaw video, and it just blew me away how even our cars aren't safe. Anyone got tips for how to anonymize their car?

Linux Server OSes?
I've seen a lot of different enterprise and personal use distros for servers, but what do you guys use?
I'm planning on using Debian but was wondering if there are any other good free options to consider.

Learning to back up my messages
I've been looking around to find a good, privacy respecting way to sync my messages between phones. I decided I'm going to use SyncThing so I don't have to mess around with a server. The only problem with this is that I haven't been able to find any apps that work on modern Android that routinely backup and import messages from a file/folder into the messages database. Does anyone know any app that might do this?

I've got a domain but whats next?
I recently purchased a domain for myself as a why-the-fuck-not purchase and I need some ideas for what to put on there. Some ideas so far include: Small Blog Personal S/FTP server to sync back to Minecraft server
Does anyone have other ideas? Thanks :)

Runtime Profiling in Rust
I've been trying to find something that allows me to see performance visualizations in my rust programs, but I haven't found any so far. I'm looking for something that's like SnakeViz in Python, but for Rust. If there's a better way to get about doing this, I'm all ears.